default search action
CCCI 2022: Dalian, China
- Mohammad S. Obaidat, Qiang Zhang, Guowei Wu, Kuei-Fang Hsiao, Petros Nicopolitidis, Yu Guo:
International Conference on Communications, Computing, Cybersecurity, and Informatics, CCCI 2022, Dalian, China, October 17-19, 2022. IEEE 2022, ISBN 978-1-6654-8617-0 - Wenjieline Chen, Pinghui Wu, Weichao Xu, Kewen Xia:
Research on CNN-SVM method for gastroscopic image detection. 1-6 - Abdelrahman Ahmed AlHammadi, Mohammed Lataifeh:
Examining the influence of national digital identity and smart pass platform on accelerating the processes of digital transformation. 1-6 - Pronaya Bhattacharya, Chandan Trivedi, Mohammad S. Obaidat, Kartik Patel, Sudeep Tanwar, Kuei-Fang Hsiao:
BeHAutH: A KNN-Based Classification Scheme for Behavior-Based Authentication in Web 3.0. 1-5 - Arash Hadadi, Alireza Shameli-Sendi:
A Quality of Service Aware VM Placement for User Applications in Cloud Data Center. 1-6 - Pronaya Bhattacharya, Mohammad S. Obaidat, Sakshi Sanghavi, Vatsal Sakariya, Sudeep Tanwar, Kuei-Fang Hsiao:
Internet-of-Explainable-Digital-Twins: A Case Study of Versatile Corn Production Ecosystem. 1-5 - Mahbuba Yesmin Turaba, Mehedi Hasan, Nazrul Islam Khan, Hafiz Abdur Rahman:
Fraud Detection During Financial Transactions Using Machine Learning and Deep Learning Techniques. 1-8 - Yuanyuan Han, Zhong Wang, Xin Han, Xiaoya Fan:
GaitPretreatment: Robust Pretreatment Strategy for Gait Recognition. 1-6 - Xianyu Zhang, Tao Liang, Kang An, Xiaoqiang Qiao, Xiaoyu Wang:
Secure Transmission in Cell-Free Massive MIMO Network with Phase Noise. 1-6 - Shuo Yang, Jiahao Yang, Xianshi Ge, Xiaoting Wang:
Medium and Short-Term Prediction of Power System Load Based on Improved LSTM Algorithm. 1-7 - Georgios L. Stavrinides, Helen D. Karatza:
Scheduling Tightly Coupled Parallel Jobs With Runtime-Extended Tasks on Distributed Resources. 1-7 - Abdelrahim Alzarooni, Mohammed Lataifeh:
Exploring the relationship between IT competence and digital transformation within government projects in the UAE. 1-5 - Abhijit Kasi, Mohammad S. Obaidat, Purva Rewal, Dheerendra Mishra, Kuei-Fang Hsiao:
On the security of authenticated key agreement schemes for e-healthcare. 1-6 - Yikuan Chen, Li Liang, Wei Gao:
FedADSN: Anomaly detection for social networks under decentralized federated learning. 111-117 - Nafi Ahmad, Abdul Wahab, John A. Schormans, Ali Adib Arnab:
A Novel Objective Video Quality Assessment Metric For Cloud Gaming Applications. 1-8 - Zijun Song, Qiwei Wang:
A Rotation Speed Measurement System based on Millimeter Wave. 1-8 - Chandrashekhar Meshram, Mohammad S. Obaidat, Agbotiname Lucky Imoize, Ismail Bahkali, Akshaykumar Meshram, Kuei-Fang Hsiao:
An Efficient Digital Short Signature Scheme using CCM for HC-IoT Environments. 1-6 - Abdulmonem Alshahrani, John A. Clark:
Transfer Learning Approach to Discover IDS Configurations Using Deep Neural Networks. 1-8 - Purva Rewal, Abhijit Kasi, Mohammad S. Obaidat, Dheerendra Mishra, Ankita Mishra, Kuei-Fang Hsiao:
On the Security of Content key Distribution Framework for DRM systems. 1-7 - Chandrashekhar Meshram, Mohammad S. Obaidat, Agbotiname Lucky Imoize, Ismail Bahkali, Parkash Tambare, Kuei-Fang Hsiao:
An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.